US20140226497A1 - Adjustable carrier sense threshold for wireless broadcast - Google Patents

Adjustable carrier sense threshold for wireless broadcast Download PDF

Info

Publication number
US20140226497A1
US20140226497A1 US13/763,680 US201313763680A US2014226497A1 US 20140226497 A1 US20140226497 A1 US 20140226497A1 US 201313763680 A US201313763680 A US 201313763680A US 2014226497 A1 US2014226497 A1 US 2014226497A1
Authority
US
United States
Prior art keywords
peer
load
peer network
cst
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/763,680
Other versions
US9288709B2 (en
Inventor
Gang Ding
Kiran S. CHIKKAPPA
Patrik N. Lundqvist
Rahul Malik
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Priority to US13/763,680 priority Critical patent/US9288709B2/en
Assigned to QUALCOMM INCORPORATED reassignment QUALCOMM INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DING, GANG, LUNDQVIST, PATRIK N., CHIKKAPPA, Kiran S., MALIK, RAHUL
Priority to PCT/US2014/014459 priority patent/WO2014123815A1/en
Publication of US20140226497A1 publication Critical patent/US20140226497A1/en
Application granted granted Critical
Publication of US9288709B2 publication Critical patent/US9288709B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0808Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using carrier sensing, e.g. as in CSMA
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/0231Traffic management, e.g. flow control or congestion control based on communication conditions

Definitions

  • aspects of the present disclosure relate generally to wireless communication systems, and more particularly to adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast.
  • Wireless networks are widely deployed to provide various communication services such as voice, video, packet data, messaging, broadcast and other wireless communication services. These wireless networks may be multiple-access networks capable of supporting multiple users by sharing the available network resources.
  • WLAN wireless local area network
  • an access point supports communication for a number of wireless stations within the wireless network.
  • P2P peer-to peer
  • the wireless stations communicate in a peer-to peer (P2P) manner without an access point.
  • P2P peer-to peer
  • a peer-to-peer network allows the nodes to directly communicate with one another.
  • peer-to-peer nodes within range of one another discover and communicate directly without an access point.
  • devices wake up periodically (e.g., once every minute) to broadcast a message until the information is exchanged among the devices. Any device that receives a message more recent than its current message, updates the current message and starts broadcasting the updated message based on the recent message.
  • Each device may sense a shared channel before broadcasting the updated message. When a channel noise level sensed from the shared channel is above a carrier sense threshold (CST), the device knows the channel is busy and backs-off.
  • CST carrier sense threshold
  • devices are capable of sensing when the channel noise level is above the CST, many broadcast failures and collisions occur due to a hidden node problem.
  • a conventional solution to the hidden node problem includes a request to send (RTS) and clear to send (CTS) handshake for reserving the channel before transmitting actual data over the channel.
  • RTS request to send
  • CTS clear to send
  • Other solutions exist for different scenarios and system requirements, such as multiple channels, multiple radios, transmission power control, etc. These solutions, however, do not apply to broadcast messaging without RTS and CTS. Further, existing solutions address the hidden node problem for the purpose of increasing a continuous data throughput of each device.
  • a method for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast includes monitoring a load of the peer-to-peer network before broadcasting a message from a node.
  • the method may also include adjusting a carrier sense threshold (CST) based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • CST carrier sense threshold
  • an apparatus for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast includes a means for monitoring a load of the peer-to-peer network before broadcasting a message from a node.
  • the apparatus may also include a means for adjusting the CST based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • a computer program product for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast.
  • the computer program product includes a computer readable medium having non-transitory program code recorded thereon.
  • the program code includes program code to monitor a load of the peer-to-peer network before broadcasting a message from a node.
  • the program code also includes program code to adjust the CST based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • an apparatus for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast includes a memory and a processor(s) coupled to the memory.
  • the processor(s) is configured to monitor a load of the peer-to-peer network before broadcasting a message from a node.
  • the processor(s) is further configured to adjust the CST based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • FIG. 1 illustrates a block diagram of a peer-to-peer network according to one aspect of the disclosure.
  • FIG. 2 illustrates exemplary wireless nodes for use in the peer-to-peer network illustrated in FIG. 1 .
  • FIG. 3 is a diagram illustrating the hidden node problem.
  • FIG. 4 is a diagram illustrating larger carrier sense ranges resulting from lowered carrier sense thresholds.
  • FIG. 5 is an exemplary graph illustrating an adjustable carrier sense threshold (CST) scheme based on sensed network conditions.
  • CST adjustable carrier sense threshold
  • FIG. 6 is a block diagram illustrating a service discovery method implemented in the peer-to-peer network illustrated in FIG. 1 .
  • FIG. 7 is a diagram illustrating an example of a hardware implementation for an apparatus employing a service discovery system.
  • Some aspects of the disclosure describe a method for adjusting a carrier sense threshold (CST) to avoid hidden nodes during wireless broadcast in a wireless network.
  • CST carrier sense threshold
  • aspects of the disclosure relate to ad-hoc and/or peer-to-peer network implementations in which wireless nodes and/or wireless stations discover and communicate directly without access points, the wireless nodes may be specified as access points and stations. Alternatively, access points can operate as peers.
  • a load of the P2P network is monitored before sending the broadcast message from a wireless node.
  • the CST for broadcasting a message is adjusted based on the P2P network load to avoid broadcast message collisions due to one or more hidden nodes. For example, the CST may be lowered as a way to improve the capability of the wireless nodes to sense a shared channel before broadcasting a message. Lowering the CST may result in a larger carrier sense range.
  • the larger carrier sense range improves the ability of the wireless nodes to sense when a hidden node is broadcasting in the shared channel and to back-off to avoid collision with the hidden node.
  • the method for adjusting the carrier sense threshold to avoid hidden nodes during wireless broadcast may be implemented in various wireless networks such as the configuration shown in FIG. 1 .
  • FIG. 1 illustrates a block diagram of a peer-to-peer network 100 according to one aspect of the disclosure.
  • the peer-to-peer network 100 may be established between two or more wireless nodes (i.e., peer-to-peer network nodes) 102 ( 102 - 1 , 102 - 2 , 102 - 3 , 102 - 4 , . . . 102 - n ).
  • the wireless nodes 102 in the peer-to-peer network 100 may communicate wirelessly using any suitable wireless network standard.
  • the peer-to-peer network 100 may include a number of wireless nodes 102 that can communicate with one another over wireless links 104 .
  • the wireless nodes 102 may be any device configured to send and receive wireless communications, such as a laptop computer, smartphone, a printer, a personal digital assistant, a camera, a cordless telephone, a session initiation protocol phone, a handheld device having wireless connection capability, a user equipment, an access terminal, a base station, a base transceiver station, or any other suitable device.
  • the wireless nodes 102 in the peer-to-peer network 100 may communicate wirelessly using any suitable wireless network standard. Although the peer-to-peer network 100 is illustrated the number of the wireless nodes 102 is five, it should be appreciated that any number of nodes may form the peer-to-peer network 100 .
  • the wireless nodes 102 may be distributed throughout a geographic region. Each of the wireless nodes 102 may have a different coverage region over which it may communicate.
  • One of the wireless nodes 102 may associate with any other of wireless nodes 102 (e.g., wireless node 102 - 4 ) to send and/or receive communications.
  • service related information for services or applications is included in a wireless message broadcast by one of the wireless nodes 102 .
  • the wireless nodes 102 may perform a broad coverage search over a coverage region.
  • FIG. 2 illustrates exemplary wireless nodes for use in the peer-to-peer network illustrated in FIG. 1 .
  • the wireless nodes in the peer-to-peer network 100 may include a first wireless station 115 in communication with a second wireless station 120 .
  • Each of the wireless nodes in the peer-to-peer network 100 may include a wireless transceiver to support wireless communication and controller functionality to manage communication over the network.
  • the controller functionality may be implemented within one or more digital processing devices.
  • the wireless transceiver may be coupled to one or more antennas to facilitate the transmission and reception of signals over a wireless channel.
  • the first wireless station 115 may be equipped with antennas 234 a through 234 t
  • the second wireless station 120 may be equipped with antennas 252 a through 252 r.
  • a transmit processor 220 may receive data from a data source 212 and control information from a controller/processor 240 .
  • the transmit processor 220 may process (e.g., encode and symbol map) the data and control information to obtain data symbols and control symbols, respectively.
  • the transmit processor 220 may also generate reference symbols, and cell-specific reference signal.
  • a transmit (TX) multiple-input multiple-output (MIMO) processor 230 may perform spatial processing (e.g., precoding) on the data symbols, the control symbols, and/or the reference symbols, if applicable, and may provide output symbol streams to the modulators (MODs) 232 a through 232 t .
  • MIMO multiple-input multiple-output
  • Each modulator/demodulator 232 may process a respective output symbol stream to obtain an output sample stream. Each modulator/demodulator 232 may further process (e.g., convert to analog, amplify, filter, and upconvert) the output sample stream to obtain a transmission signal. Signals from modulators 232 a through 232 t may be transmitted via the antennas 234 a through 234 t , respectively.
  • the antennas 252 a through 252 r may receive the signals from the first wireless station 115 and may provide received signals to the demodulators (DEMODs) 254 a through 254 r , respectively.
  • Each modulator/demodulator 254 a may condition (e.g., filter, amplify, downconvert, and digitize) a respective received signal to obtain input samples.
  • Each modulator/demodulator 254 a may further process the input samples to obtain received symbols.
  • a MIMO detector 256 may obtain received symbols from all the modulator/demodulator 254 ( 254 a , . . . , 254 r ) perform MIMO detection on the received symbols if applicable, and provide detected symbols.
  • a receive processor 258 may process (e.g., demodulate, deinterleave, and decode) the detected symbols, provide decoded data for the second wireless station 120 to a data sink 260 , and provide decoded control information to a controller/processor 280 .
  • a transmit processor 264 may receive and process data from a data source 262 and control information from the controller/processor 280 .
  • the transmit processor 264 may also generate reference symbols for a reference signal.
  • the symbols from the transmit processor 264 may be precoded by a TX MIMO processor 266 if applicable, further processed by the modulator/demodulator 254 ( 254 a , . . . , 254 r ) and transmitted to the first wireless station 115 .
  • the signals received from the second wireless station 120 may be received by the antennas 234 , processed by the modulator/demodulator 232 , detected by a MIMO detector 236 if applicable, and further processed by a receive processor 238 to obtain decoded data and control information sent by the second wireless station 120 .
  • the receive processor 238 may provide the decoded data to a data sink 239 and the decoded control information to the controller/processor 240 .
  • the controller/processor 240 and the controller/processor 280 may direct the first wireless station 115 and the second wireless station 120 , respectively.
  • the controller/processor 240 , 280 and/or other processors and modules at the first wireless station 115 /second wireless station 120 may perform or direct the execution of the functional blocks illustrated in method flow chart of FIG. 6 , and/or other processes for the techniques described herein.
  • the memory 242 and the memory 282 may store data and program codes for the first wireless station 115 and the second wireless station 120 , respectively.
  • FIG. 3 is a diagram 300 illustrating the hidden node problem with respect to peer-to-peer (P2P) network nodes A, B and C (e.g., wireless nodes 102 of FIG. 1 ).
  • the nodes A, B and C of FIG. 3 are arranged as follows: node C operates within a carrier sense range 302 and a carrier sense range 304 associated with nodes A and B, respectively; and node B operates outside the carrier sense range 302 associated with node A. In this configuration, node C operates in carrier sense region 306 corresponding to an overlap of the carrier sense range 302 and the carrier sense range 304 associated with nodes A and B, respectively.
  • the carrier sense range of a node may be defined as the area encompassing those nodes whose transmission A is perceived (i.e., carrier sensed) while not necessarily being able to process the transmission.
  • node B may not detect ongoing broadcasting from node A to node C by carrier sensing. Consequently, node B can interfere with node C's reception of node A's broadcast message. Because node A and node B cannot sense each other, the broadcast message from node A may collide with the broadcast message from node B because node C is a hidden node. This collision may occur even when nodes A and B avoid broadcasting at exactly the same time.
  • a carrier sense threshold (CST) adjustment for broadcasting a message is implemented to improve sensing of a broadcast message by a node.
  • the CST may be lowered as a way to improve the capability of devices, such as peer-to-peer (P2P) network nodes A and/or B to sense the shared channel before broadcasting a message.
  • P2P peer-to-peer
  • the CST is lowered by adjusting the CST according to an upper layer enabled on a node (e.g., A or B). Lowering the CST may result in a larger carrier sense range, thereby improving the ability of node A and/or node B to sense when a node is broadcasting in the shared channel and to back-off to avoid collision at a hidden node C.
  • FIG. 4 is a diagram 400 illustrating larger carrier sense ranges of nodes A and B resulting from lowering the CST for a broadcast message.
  • lowering the CST results in larger carrier sense range 402 and larger carrier sense range 404 associated with nodes A and B, respectively.
  • Nodes A, B and C can be arranged such that nodes A, B and C are operating within the larger carrier sense range 402 and the larger carrier sense range 404 of nodes A and B, respectively.
  • Nodes A, B and C may also operate in the carrier sense region 406 corresponding to an overlap of the larger carrier sense range 402 and the larger carrier sense range 404 associated with nodes A and B, respectively.
  • node B may detect ongoing broadcasting from node A to node C.
  • nodes A and/or B can sense broadcast messages to node C, nodes A and/or B may backoff to avoid collision of broadcast messages. Consequently, node B may not interfere with node C's reception of node A's broadcast message. In one aspect of the disclosure, backing off is based solely on the carrier sense threshold.
  • a carrier sense threshold (CST) based on dynamic network conditions may be implemented to improve solutions to the hidden node problem while increasing the number of nodes broadcasting at substantially the same time.
  • the implementation is scalable and can support an increased number of nodes because it is based on broadcasting one message (e.g., a small size message) at a time for each node rather than increasing a continuous data throughput of each node.
  • the increased number of nodes e.g., 100s to 1000s of nodes
  • each node (A or B) stays awake for a period of time (e.g., a predetermined period of time) to monitor the shared channel and sense the network conditions after the node has broadcasted a message.
  • the sensed network conditions may be based on an amount of successfully received messages from a neighbor node, a determination of a percentage of time the channel is busy (e.g., indicated by the number of times the noise level is above the CST), or other determinations for reducing broadcast collisions.
  • an appropriate CST is selected based on the network conditions.
  • FIG. 5 is an exemplary graph 500 illustrating an adjustable CST scheme based on the sensed network conditions.
  • the network conditions may reflect whether the network is crowded (based on an amount of neighbor messages) or whether the channel is busy.
  • the y-axis of the graph represents the CST.
  • the x-axis of the graph represents the network condition (e.g., network crowd that increases from left to right).
  • a network crowd indicator X 1 on the x-axis represents when the network is least crowded. This least crowded indicator X 1 corresponds to an increased CST value Y 4 .
  • the CST is reduced to a value Y 1 .
  • Representative arrows (e.g., Z 1 , Z 2 and Z 3 ) illustrate adjustments in the CST for a broadcast message as the network conditions change.
  • arrow Z 1 represents an increase in CST from Y 3 to Y 4 corresponding to a decrease in the crowd indicator from X 3 to X 2 .
  • Arrow Z 2 represents a decrease in CST from Y 2 to Y 1 corresponding to a crowd indicator increase from X 5 to X 6 .
  • the CST is maintained at a value Y 2 (e.g., as illustrated by arrow Z 3 ) when the network conditions (crowd indicators) are within a small range between X 4 and X 5 .
  • FIG. 6 is a block diagram 600 illustrating a carrier sense threshold adjustment method to avoid hidden nodes during wireless broadcast in a network.
  • the method can be implemented in the peer-to-peer network 100 illustrated in FIG. 1 .
  • the method includes monitoring a load of the peer-to-peer network before broadcasting a message from a node.
  • the load of the peer-to-peer network may be determined by determining an amount of broadcast activity from neighbor nodes, counting successfully received messages from the neighbor nodes, counting a percentage of time a channel is busy, or the like.
  • the channel may be busy when a noise level on the channel exceeds a current carrier sense threshold (CST).
  • CST current carrier sense threshold
  • the method includes adjusting the CST based on the peer-to-peer network load to avoid broadcast message collisions due to a hidden node.
  • the node may be one of the wireless nodes 102 .
  • FIG. 7 is a diagram illustrating an example of a hardware implementation for an apparatus 700 (such as one of the wireless nodes 102 , the first wireless station 115 and the second wireless station 120 ) employing a carrier sense threshold adjustment system 714 .
  • the carrier sense threshold adjustment system 714 may be implemented with a bus architecture, represented generally by a bus 724 .
  • the bus 724 may include any number of interconnecting buses and bridges depending on the specific application of the carrier sense threshold adjustment system 714 and the overall design constraints.
  • the bus 724 links together various circuits including one or more processors and/or hardware modules, represented by a processor 726 , a monitoring module 702 , an adjusting module 704 and a computer-readable medium 728 .
  • the bus 724 may also link various other circuits such as timing sources, peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further.
  • the apparatus includes the carrier sense threshold adjustment system 714 coupled to a transceiver 722 .
  • the transceiver 722 is coupled to one or more antennas 720 .
  • the transceiver 722 provides a way for communicating with various other apparatus over a transmission medium.
  • the carrier sense threshold adjustment system 714 includes the processor 726 coupled to the computer-readable medium 728 .
  • the processor 726 is responsible for general processing, including the execution of software stored on the computer-readable medium 728 .
  • the software when executed by the processor 726 , causes the carrier sense threshold adjustment system 714 to perform the various functions described supra for any particular apparatus.
  • the computer-readable medium 728 may also be used for storing data that is manipulated by the processor 726 when executing software.
  • the carrier sense threshold adjustment system 714 further includes the monitoring module 702 monitoring a load of the peer-to-peer network before broadcasting a message from a node.
  • the carrier sense threshold adjustment system 714 further includes the adjusting module 704 for adjusting a carrier sense threshold (CST) based on the peer-to-peer network load to avoid broadcast message collisions due to a hidden node.
  • the monitoring module 702 and the adjusting module 704 may be software modules running in the processor 726 , resident/stored in the computer-readable medium 728 , one or more hardware modules coupled to the processor 726 , or some combination thereof.
  • the carrier sense threshold adjustment system 714 may be a component of the second wireless station 120 , a component of the wireless nodes 102 and/or a component of the first wireless station 115 and may include the memory 242 , 282 and/or the controller/processor 240 , 280 .
  • the apparatus 700 for wireless communication includes means for monitoring a load of the peer-to-peer network and means for adjusting a carrier sense threshold (CST) based on the peer-to-peer network load.
  • the means may be the monitoring module 702 , adjusting module 704 , the second wireless station 120 , the first wireless station 115 , the memory 242 , 282 , the controller/processor 240 , 280 , and/or the carrier sense threshold adjustment system 714 of the apparatus 700 configured to perform the functions recited by the embedding means and the broadcasting means.
  • the aforementioned means may be any module or any apparatus configured to perform the functions recited by the aforementioned means.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
  • An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium.
  • the storage medium may be integral to the processor.
  • the processor and the storage medium may reside in an ASIC.
  • the ASIC may reside in a user terminal.
  • the processor and the storage medium may reside as discrete components in a user terminal.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage media may be any available media that can be accessed by a general purpose or special purpose computer.
  • such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code means in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.

Abstract

A method of adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast. The method includes monitoring a load of the peer-to-peer network before broadcasting a message from a node. The method also includes adjusting a carrier sense threshold (CST) based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.

Description

    BACKGROUND
  • 1. Field
  • Aspects of the present disclosure relate generally to wireless communication systems, and more particularly to adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast.
  • 2. Background
  • Wireless networks are widely deployed to provide various communication services such as voice, video, packet data, messaging, broadcast and other wireless communication services. These wireless networks may be multiple-access networks capable of supporting multiple users by sharing the available network resources. In a wireless local area network (WLAN), an access point supports communication for a number of wireless stations within the wireless network. In an ad-hoc mode, the wireless stations communicate in a peer-to peer (P2P) manner without an access point. Similarly, a peer-to-peer network allows the nodes to directly communicate with one another. In a peer-to-peer network, peer-to-peer nodes within range of one another discover and communicate directly without an access point.
  • During fast message dissemination in a large P2P wireless network, devices wake up periodically (e.g., once every minute) to broadcast a message until the information is exchanged among the devices. Any device that receives a message more recent than its current message, updates the current message and starts broadcasting the updated message based on the recent message. Each device may sense a shared channel before broadcasting the updated message. When a channel noise level sensed from the shared channel is above a carrier sense threshold (CST), the device knows the channel is busy and backs-off. Although devices are capable of sensing when the channel noise level is above the CST, many broadcast failures and collisions occur due to a hidden node problem.
  • A conventional solution to the hidden node problem includes a request to send (RTS) and clear to send (CTS) handshake for reserving the channel before transmitting actual data over the channel. Other solutions exist for different scenarios and system requirements, such as multiple channels, multiple radios, transmission power control, etc. These solutions, however, do not apply to broadcast messaging without RTS and CTS. Further, existing solutions address the hidden node problem for the purpose of increasing a continuous data throughput of each device.
  • SUMMARY
  • According to one aspect of the present disclosure, a method for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast is described. The method includes monitoring a load of the peer-to-peer network before broadcasting a message from a node. The method may also include adjusting a carrier sense threshold (CST) based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • According to another aspect of the present disclosure, an apparatus for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast is described. The apparatus includes a means for monitoring a load of the peer-to-peer network before broadcasting a message from a node. The apparatus may also include a means for adjusting the CST based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • According to one aspect of the present disclosure, a computer program product for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast is described. The computer program product includes a computer readable medium having non-transitory program code recorded thereon. The program code includes program code to monitor a load of the peer-to-peer network before broadcasting a message from a node. The program code also includes program code to adjust the CST based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • According to one aspect of the present disclosure, an apparatus for adjusting a carrier sense threshold to avoid hidden nodes during wireless broadcast is described. The apparatus includes a memory and a processor(s) coupled to the memory. The processor(s) is configured to monitor a load of the peer-to-peer network before broadcasting a message from a node. The processor(s) is further configured to adjust the CST based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
  • This has outlined, rather broadly, the features and technical advantages of the present disclosure in order that the detailed description that follows may be better understood. Additional features and advantages of the disclosure will be described below. It should be appreciated by those skilled in the art that this disclosure may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present disclosure. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the teachings of the disclosure as set forth in the appended claims. The novel features, which are believed to be characteristic of the disclosure, both as to its organization and method of operation, together with further objects and advantages, will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present disclosure.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The features, nature, and advantages of the present disclosure will become more apparent from the detailed description set forth below when taken in conjunction with the drawings in which like reference characters identify correspondingly throughout.
  • FIG. 1 illustrates a block diagram of a peer-to-peer network according to one aspect of the disclosure.
  • FIG. 2 illustrates exemplary wireless nodes for use in the peer-to-peer network illustrated in FIG. 1.
  • FIG. 3 is a diagram illustrating the hidden node problem.
  • FIG. 4 is a diagram illustrating larger carrier sense ranges resulting from lowered carrier sense thresholds.
  • FIG. 5 is an exemplary graph illustrating an adjustable carrier sense threshold (CST) scheme based on sensed network conditions.
  • FIG. 6 is a block diagram illustrating a service discovery method implemented in the peer-to-peer network illustrated in FIG. 1.
  • FIG. 7 is a diagram illustrating an example of a hardware implementation for an apparatus employing a service discovery system.
  • DETAILED DESCRIPTION
  • The detailed description set forth below, in connection with the appended drawings, is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The detailed description includes specific details for the purpose of providing a thorough understanding of the various concepts. It will be apparent to those skilled in the art however, that these concepts may be practiced without these specific details. In some instances, well-known structures and components are shown in block diagram form to avoid obscuring such concepts. As described herein, the use of the term “and/or” is intended to represent an “inclusive OR”, and the use of the term “or” is intended to represent an “exclusive OR”.
  • Some aspects of the disclosure describe a method for adjusting a carrier sense threshold (CST) to avoid hidden nodes during wireless broadcast in a wireless network. Although aspects of the disclosure relate to ad-hoc and/or peer-to-peer network implementations in which wireless nodes and/or wireless stations discover and communicate directly without access points, the wireless nodes may be specified as access points and stations. Alternatively, access points can operate as peers.
  • As noted, current solutions address the hidden node problem for the purpose of increasing a continuous data throughput of each wireless node. Aspects of the present disclosure, however, address the hidden node problem while sending a single broadcast message from each wireless node and expecting the broadcast message to quickly propagate throughout the entire P2P network. In one aspect of the present disclosure, a load of the P2P network is monitored before sending the broadcast message from a wireless node. The CST for broadcasting a message is adjusted based on the P2P network load to avoid broadcast message collisions due to one or more hidden nodes. For example, the CST may be lowered as a way to improve the capability of the wireless nodes to sense a shared channel before broadcasting a message. Lowering the CST may result in a larger carrier sense range. The larger carrier sense range improves the ability of the wireless nodes to sense when a hidden node is broadcasting in the shared channel and to back-off to avoid collision with the hidden node. The method for adjusting the carrier sense threshold to avoid hidden nodes during wireless broadcast may be implemented in various wireless networks such as the configuration shown in FIG. 1.
  • FIG. 1 illustrates a block diagram of a peer-to-peer network 100 according to one aspect of the disclosure. In some aspects, the peer-to-peer network 100 may be established between two or more wireless nodes (i.e., peer-to-peer network nodes) 102 (102-1, 102-2, 102-3, 102-4, . . . 102-n). The wireless nodes 102 in the peer-to-peer network 100 may communicate wirelessly using any suitable wireless network standard. The peer-to-peer network 100 may include a number of wireless nodes 102 that can communicate with one another over wireless links 104.
  • The wireless nodes 102 may be any device configured to send and receive wireless communications, such as a laptop computer, smartphone, a printer, a personal digital assistant, a camera, a cordless telephone, a session initiation protocol phone, a handheld device having wireless connection capability, a user equipment, an access terminal, a base station, a base transceiver station, or any other suitable device. The wireless nodes 102 in the peer-to-peer network 100 may communicate wirelessly using any suitable wireless network standard. Although the peer-to-peer network 100 is illustrated the number of the wireless nodes 102 is five, it should be appreciated that any number of nodes may form the peer-to-peer network 100. In the peer-to-peer network 100, the wireless nodes 102 may be distributed throughout a geographic region. Each of the wireless nodes 102 may have a different coverage region over which it may communicate.
  • One of the wireless nodes 102 (e.g., wireless node 102-1) may associate with any other of wireless nodes 102 (e.g., wireless node 102-4) to send and/or receive communications. In one aspect of the disclosure, service related information for services or applications is included in a wireless message broadcast by one of the wireless nodes 102. To receive the wireless messages, the wireless nodes 102 may perform a broad coverage search over a coverage region.
  • FIG. 2 illustrates exemplary wireless nodes for use in the peer-to-peer network illustrated in FIG. 1. The wireless nodes in the peer-to-peer network 100 may include a first wireless station 115 in communication with a second wireless station 120. Each of the wireless nodes in the peer-to-peer network 100 may include a wireless transceiver to support wireless communication and controller functionality to manage communication over the network. The controller functionality may be implemented within one or more digital processing devices. The wireless transceiver may be coupled to one or more antennas to facilitate the transmission and reception of signals over a wireless channel.
  • In one configuration, the first wireless station 115 may be equipped with antennas 234 a through 234 t, and the second wireless station 120 may be equipped with antennas 252 a through 252 r.
  • At the first wireless station 115, a transmit processor 220 may receive data from a data source 212 and control information from a controller/processor 240. The transmit processor 220 may process (e.g., encode and symbol map) the data and control information to obtain data symbols and control symbols, respectively. The transmit processor 220 may also generate reference symbols, and cell-specific reference signal. A transmit (TX) multiple-input multiple-output (MIMO) processor 230 may perform spatial processing (e.g., precoding) on the data symbols, the control symbols, and/or the reference symbols, if applicable, and may provide output symbol streams to the modulators (MODs) 232 a through 232 t. Each modulator/demodulator 232 may process a respective output symbol stream to obtain an output sample stream. Each modulator/demodulator 232 may further process (e.g., convert to analog, amplify, filter, and upconvert) the output sample stream to obtain a transmission signal. Signals from modulators 232 a through 232 t may be transmitted via the antennas 234 a through 234 t, respectively.
  • At the second wireless station 120, the antennas 252 a through 252 r may receive the signals from the first wireless station 115 and may provide received signals to the demodulators (DEMODs) 254 a through 254 r, respectively. Each modulator/demodulator 254 a may condition (e.g., filter, amplify, downconvert, and digitize) a respective received signal to obtain input samples. Each modulator/demodulator 254 a may further process the input samples to obtain received symbols. A MIMO detector 256 may obtain received symbols from all the modulator/demodulator 254 (254 a, . . . , 254 r) perform MIMO detection on the received symbols if applicable, and provide detected symbols. A receive processor 258 may process (e.g., demodulate, deinterleave, and decode) the detected symbols, provide decoded data for the second wireless station 120 to a data sink 260, and provide decoded control information to a controller/processor 280.
  • When transmitting, from the second wireless station 120, a transmit processor 264 may receive and process data from a data source 262 and control information from the controller/processor 280. The transmit processor 264 may also generate reference symbols for a reference signal. The symbols from the transmit processor 264 may be precoded by a TX MIMO processor 266 if applicable, further processed by the modulator/demodulator 254 (254 a, . . . , 254 r) and transmitted to the first wireless station 115. At the first wireless station 115, the signals received from the second wireless station 120 may be received by the antennas 234, processed by the modulator/demodulator 232, detected by a MIMO detector 236 if applicable, and further processed by a receive processor 238 to obtain decoded data and control information sent by the second wireless station 120. The receive processor 238 may provide the decoded data to a data sink 239 and the decoded control information to the controller/processor 240.
  • The controller/processor 240 and the controller/processor 280 may direct the first wireless station 115 and the second wireless station 120, respectively. The controller/ processor 240, 280 and/or other processors and modules at the first wireless station 115/second wireless station 120 may perform or direct the execution of the functional blocks illustrated in method flow chart of FIG. 6, and/or other processes for the techniques described herein. The memory 242 and the memory 282 may store data and program codes for the first wireless station 115 and the second wireless station 120, respectively.
  • FIG. 3 is a diagram 300 illustrating the hidden node problem with respect to peer-to-peer (P2P) network nodes A, B and C (e.g., wireless nodes 102 of FIG. 1). The nodes A, B and C of FIG. 3 are arranged as follows: node C operates within a carrier sense range 302 and a carrier sense range 304 associated with nodes A and B, respectively; and node B operates outside the carrier sense range 302 associated with node A. In this configuration, node C operates in carrier sense region 306 corresponding to an overlap of the carrier sense range 302 and the carrier sense range 304 associated with nodes A and B, respectively. The carrier sense range of a node (e.g., node A) may be defined as the area encompassing those nodes whose transmission A is perceived (i.e., carrier sensed) while not necessarily being able to process the transmission. In this configuration, node B may not detect ongoing broadcasting from node A to node C by carrier sensing. Consequently, node B can interfere with node C's reception of node A's broadcast message. Because node A and node B cannot sense each other, the broadcast message from node A may collide with the broadcast message from node B because node C is a hidden node. This collision may occur even when nodes A and B avoid broadcasting at exactly the same time.
  • The hidden node problem for broadcast may be addressed by an implementation based on scalability and speed of disseminating information independent of acknowledge/negative acknowledge signal. In one aspect of the present disclosure, a carrier sense threshold (CST) adjustment for broadcasting a message is implemented to improve sensing of a broadcast message by a node. For example, the CST may be lowered as a way to improve the capability of devices, such as peer-to-peer (P2P) network nodes A and/or B to sense the shared channel before broadcasting a message. The CST is lowered by adjusting the CST according to an upper layer enabled on a node (e.g., A or B). Lowering the CST may result in a larger carrier sense range, thereby improving the ability of node A and/or node B to sense when a node is broadcasting in the shared channel and to back-off to avoid collision at a hidden node C.
  • FIG. 4 is a diagram 400 illustrating larger carrier sense ranges of nodes A and B resulting from lowering the CST for a broadcast message. In FIG. 4, lowering the CST results in larger carrier sense range 402 and larger carrier sense range 404 associated with nodes A and B, respectively. Nodes A, B and C can be arranged such that nodes A, B and C are operating within the larger carrier sense range 402 and the larger carrier sense range 404 of nodes A and B, respectively. Nodes A, B and C may also operate in the carrier sense region 406 corresponding to an overlap of the larger carrier sense range 402 and the larger carrier sense range 404 associated with nodes A and B, respectively. As a result, node B may detect ongoing broadcasting from node A to node C. Because node A and node B can sense broadcast messages to node C, nodes A and/or B may backoff to avoid collision of broadcast messages. Consequently, node B may not interfere with node C's reception of node A's broadcast message. In one aspect of the disclosure, backing off is based solely on the carrier sense threshold.
  • A carrier sense threshold (CST) based on dynamic network conditions may be implemented to improve solutions to the hidden node problem while increasing the number of nodes broadcasting at substantially the same time. The implementation is scalable and can support an increased number of nodes because it is based on broadcasting one message (e.g., a small size message) at a time for each node rather than increasing a continuous data throughput of each node. As a result, the increased number of nodes (e.g., 100s to 1000s of nodes) can be supported at one time. In this implementation, each node (A or B) stays awake for a period of time (e.g., a predetermined period of time) to monitor the shared channel and sense the network conditions after the node has broadcasted a message. The sensed network conditions may be based on an amount of successfully received messages from a neighbor node, a determination of a percentage of time the channel is busy (e.g., indicated by the number of times the noise level is above the CST), or other determinations for reducing broadcast collisions. In one aspect of the present disclosure, an appropriate CST is selected based on the network conditions.
  • FIG. 5 is an exemplary graph 500 illustrating an adjustable CST scheme based on the sensed network conditions. As noted, the network conditions may reflect whether the network is crowded (based on an amount of neighbor messages) or whether the channel is busy. The y-axis of the graph represents the CST. The x-axis of the graph represents the network condition (e.g., network crowd that increases from left to right). A network crowd indicator X1 on the x-axis represents when the network is least crowded. This least crowded indicator X1 corresponds to an increased CST value Y4. As the network crowd indicator increases to X7, for example, the CST is reduced to a value Y1. Representative arrows (e.g., Z1, Z2 and Z3) illustrate adjustments in the CST for a broadcast message as the network conditions change. For example, arrow Z1 represents an increase in CST from Y3 to Y4 corresponding to a decrease in the crowd indicator from X3 to X2. Arrow Z2 represents a decrease in CST from Y2 to Y1 corresponding to a crowd indicator increase from X5 to X6. The CST is maintained at a value Y2 (e.g., as illustrated by arrow Z3) when the network conditions (crowd indicators) are within a small range between X4 and X5.
  • FIG. 6 is a block diagram 600 illustrating a carrier sense threshold adjustment method to avoid hidden nodes during wireless broadcast in a network. The method can be implemented in the peer-to-peer network 100 illustrated in FIG. 1. At block 610, the method includes monitoring a load of the peer-to-peer network before broadcasting a message from a node. For example, the load of the peer-to-peer network may be determined by determining an amount of broadcast activity from neighbor nodes, counting successfully received messages from the neighbor nodes, counting a percentage of time a channel is busy, or the like. The channel may be busy when a noise level on the channel exceeds a current carrier sense threshold (CST). At block 612, the method includes adjusting the CST based on the peer-to-peer network load to avoid broadcast message collisions due to a hidden node. In the illustration of FIG. 1, the node may be one of the wireless nodes 102.
  • FIG. 7 is a diagram illustrating an example of a hardware implementation for an apparatus 700 (such as one of the wireless nodes 102, the first wireless station 115 and the second wireless station 120) employing a carrier sense threshold adjustment system 714. The carrier sense threshold adjustment system 714 may be implemented with a bus architecture, represented generally by a bus 724. The bus 724 may include any number of interconnecting buses and bridges depending on the specific application of the carrier sense threshold adjustment system 714 and the overall design constraints. The bus 724 links together various circuits including one or more processors and/or hardware modules, represented by a processor 726, a monitoring module 702, an adjusting module 704 and a computer-readable medium 728. The bus 724 may also link various other circuits such as timing sources, peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further.
  • The apparatus includes the carrier sense threshold adjustment system 714 coupled to a transceiver 722. The transceiver 722 is coupled to one or more antennas 720. The transceiver 722 provides a way for communicating with various other apparatus over a transmission medium. The carrier sense threshold adjustment system 714 includes the processor 726 coupled to the computer-readable medium 728. The processor 726 is responsible for general processing, including the execution of software stored on the computer-readable medium 728. The software, when executed by the processor 726, causes the carrier sense threshold adjustment system 714 to perform the various functions described supra for any particular apparatus. The computer-readable medium 728 may also be used for storing data that is manipulated by the processor 726 when executing software.
  • The carrier sense threshold adjustment system 714 further includes the monitoring module 702 monitoring a load of the peer-to-peer network before broadcasting a message from a node. The carrier sense threshold adjustment system 714 further includes the adjusting module 704 for adjusting a carrier sense threshold (CST) based on the peer-to-peer network load to avoid broadcast message collisions due to a hidden node. The monitoring module 702 and the adjusting module 704 may be software modules running in the processor 726, resident/stored in the computer-readable medium 728, one or more hardware modules coupled to the processor 726, or some combination thereof. The carrier sense threshold adjustment system 714 may be a component of the second wireless station 120, a component of the wireless nodes 102 and/or a component of the first wireless station 115 and may include the memory 242, 282 and/or the controller/ processor 240, 280.
  • In one configuration, the apparatus 700 for wireless communication includes means for monitoring a load of the peer-to-peer network and means for adjusting a carrier sense threshold (CST) based on the peer-to-peer network load. The means may be the monitoring module 702, adjusting module 704, the second wireless station 120, the first wireless station 115, the memory 242, 282, the controller/ processor 240, 280, and/or the carrier sense threshold adjustment system 714 of the apparatus 700 configured to perform the functions recited by the embedding means and the broadcasting means. In another aspect, the aforementioned means may be any module or any apparatus configured to perform the functions recited by the aforementioned means.
  • Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
  • The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • The steps of a method or algorithm described in connection with the disclosure may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
  • In one or more exemplary designs, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code means in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
  • The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the spirit or scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (20)

What is claimed is:
1. A method of wireless communication in a peer-to-peer network, comprising:
monitoring a load of the peer-to-peer network before broadcasting a message from a node; and
adjusting a carrier sense threshold (CST) based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
2. The method of claim 1, in which adjusting comprises lowering the CST when the load of the peer-to-peer network increases.
3. The method of claim 1, in which adjusting comprises increasing the CST when the load of the peer-to-peer network decreases.
4. The method of claim 1, in which the load of the peer-to-peer network comprises an amount of broadcast activity from neighbor nodes.
5. The method of claim 4, in which monitoring the load of the peer-to-peer network comprises counting successfully received messages from the neighbor nodes.
6. The method of claim 4, in which monitoring the load of the peer-to-peer network comprises counting a percentage of time a channel is busy.
7. The method of claim 6, in which the channel is determined to be busy when a noise level on the channel exceeds a current CST.
8. An apparatus for wireless communication in a peer-to-peer network, comprising:
means for monitoring a load of the peer-to-peer network before broadcasting a message from a node; and
means for adjusting a carrier sense threshold (CST) based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
9. The apparatus of claim 8, in which the adjusting means further comprises means for adjusting by lowering the CST when the load of the peer-to-peer network increases.
10. The apparatus of claim 8, in which the adjusting means further comprises means for adjusting by increasing the CST when the load of the peer-to-peer network decreases.
11. An apparatus for wireless communication in a peer-to-peer network, comprising:
a memory; and
at least one processor coupled to the memory and configured:
to monitor a load of the peer-to-peer network before broadcasting a message from a node; and
to adjust a carrier sense threshold (CST) based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
12. The apparatus of claim 11, in which the at least one processor is further configured to adjust by lowering the CST when the load of the peer-to-peer network increases.
13. The apparatus of claim 11, in which the at least one processor is further configured to adjust by increasing the CST when the load of the peer-to-peer network decreases.
14. The apparatus of claim 11, in which the load of the peer-to-peer network comprises an amount of broadcast activity from neighbor nodes.
15. The apparatus of claim 14, in which the at least one processor is further configured to monitor the load of the peer-to-peer network by counting successfully received messages from the neighbor nodes.
16. The apparatus of claim 14, in which the at least one processor is further configured to monitor the load of the peer-to-peer network by counting a percentage of time a channel is busy.
17. The apparatus of claim 16, in which the at least one processor is further configured to determine that the channel is busy when a noise level on the channel exceeds a current CST.
18. A computer program product for wireless communication in a peer-to-peer network, comprising:
a computer-readable medium having non-transitory program code recorded thereon, the program code comprising:
program code to monitor a load of the peer-to-peer network before broadcasting a message from a node; and
program code to adjust a carrier sense threshold (CST) based on the load of the peer-to-peer network to avoid broadcast message collisions due to one or more hidden nodes.
19. The computer program product of claim 18, in which the program code further comprises program code to adjust by lowering the CST when the load of the peer-to-peer network increases.
20. The computer program product of claim 18, in which the program code further comprises program code to adjust by increasing the CST when the load of the peer-to-peer network decreases.
US13/763,680 2013-02-10 2013-02-10 Adjustable carrier sense threshold for wireless broadcast Expired - Fee Related US9288709B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/763,680 US9288709B2 (en) 2013-02-10 2013-02-10 Adjustable carrier sense threshold for wireless broadcast
PCT/US2014/014459 WO2014123815A1 (en) 2013-02-10 2014-02-03 Adjustable carrier sense threshold for wireless broadcast

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/763,680 US9288709B2 (en) 2013-02-10 2013-02-10 Adjustable carrier sense threshold for wireless broadcast

Publications (2)

Publication Number Publication Date
US20140226497A1 true US20140226497A1 (en) 2014-08-14
US9288709B2 US9288709B2 (en) 2016-03-15

Family

ID=50150812

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/763,680 Expired - Fee Related US9288709B2 (en) 2013-02-10 2013-02-10 Adjustable carrier sense threshold for wireless broadcast

Country Status (2)

Country Link
US (1) US9288709B2 (en)
WO (1) WO2014123815A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016039600A1 (en) * 2014-09-12 2016-03-17 Lg Electronics Inc. Method and apparatus for configuring different thresholds for different signals in wireless communication system
WO2016163930A1 (en) * 2015-04-08 2016-10-13 Telefonaktiebolaget Lm Ericsson (Publ) Csma with adaptive carrier sensing threshold in laa networks
KR101710428B1 (en) 2015-10-02 2017-02-27 숭실대학교산학협력단 Method for preventing priority inversion in power line communications, recording medium and device for performing the method
CN108200602A (en) * 2017-12-29 2018-06-22 中国电子科技集团公司第二十研究所 Multiple access method based on Load-aware in a kind of wireless self-networking
US20190037599A1 (en) * 2016-02-15 2019-01-31 Sony Corporation Communication apparatus and method, and communication system
US20190059104A1 (en) * 2016-02-05 2019-02-21 Alcatel Lucent Method and apparatus for determining channel sensing threshold in uplink channell access
CN113839720A (en) * 2021-09-06 2021-12-24 中山大学 Multiple access method of directional underwater acoustic network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110128846A1 (en) * 2008-07-28 2011-06-02 University Industry Cooperation Group Of Kyung Hee University Method for controlling access of communication medium according to mac protocol of ieee 802.11
US20120099450A1 (en) * 2010-09-27 2012-04-26 Qualcomm Incorporated Spatial reuse in a wireless network
US20130223250A1 (en) * 2012-02-29 2013-08-29 Kabushiki Kaisha Toshiba Wireless communication apparatus and interference detection method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1139606A1 (en) 2000-03-28 2001-10-04 Lucent Technologies Inc. Wireless communication in a lan with varying signal level thresholds
GB2409953B (en) 2004-07-09 2006-08-30 Compxs Uk Ltd Clear channel assessment
US20070060155A1 (en) 2005-08-31 2007-03-15 Emanuel Kahana System and method to dynamically adapt a CCA threshold
US20070214247A1 (en) 2006-03-13 2007-09-13 Xue Yang System for spatial backoff contention resolution for wireless networks
US8085683B2 (en) 2008-04-02 2011-12-27 National University Of Ireland Maynooth Method and apparatus for estimating link quality
EP2237627B1 (en) 2009-04-01 2012-01-18 Imec Method for resolving network contention
US9113371B2 (en) 2010-07-01 2015-08-18 The Hong Kong University Of Science And Technology Cross-layer optimization for next-generation WiFi systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110128846A1 (en) * 2008-07-28 2011-06-02 University Industry Cooperation Group Of Kyung Hee University Method for controlling access of communication medium according to mac protocol of ieee 802.11
US20120099450A1 (en) * 2010-09-27 2012-04-26 Qualcomm Incorporated Spatial reuse in a wireless network
US20130223250A1 (en) * 2012-02-29 2013-08-29 Kabushiki Kaisha Toshiba Wireless communication apparatus and interference detection method

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016039600A1 (en) * 2014-09-12 2016-03-17 Lg Electronics Inc. Method and apparatus for configuring different thresholds for different signals in wireless communication system
US10412753B2 (en) 2014-09-12 2019-09-10 Lg Electronics Inc. Method and apparatus for configuring different thresholds for different signals in wireless communication system
US10887896B2 (en) 2014-09-12 2021-01-05 Lg Electronics Inc. Method and apparatus for configuring different thresholds for different signals in wireless communication system
WO2016163930A1 (en) * 2015-04-08 2016-10-13 Telefonaktiebolaget Lm Ericsson (Publ) Csma with adaptive carrier sensing threshold in laa networks
KR101710428B1 (en) 2015-10-02 2017-02-27 숭실대학교산학협력단 Method for preventing priority inversion in power line communications, recording medium and device for performing the method
US9935686B2 (en) 2015-10-02 2018-04-03 Foundation Of Soongsil University-Industry Cooperation Method of preventing priority inversion in power line communication, recording medium and apparatus for performing the same
US20190059104A1 (en) * 2016-02-05 2019-02-21 Alcatel Lucent Method and apparatus for determining channel sensing threshold in uplink channell access
US11729823B2 (en) * 2016-02-05 2023-08-15 Alcatel Lucent Method and apparatus for determining channel sensing threshold in uplink channel access
US20190037599A1 (en) * 2016-02-15 2019-01-31 Sony Corporation Communication apparatus and method, and communication system
US10904918B2 (en) * 2016-02-15 2021-01-26 Sony Corporation Communication apparatus and method, and communication system
CN108200602A (en) * 2017-12-29 2018-06-22 中国电子科技集团公司第二十研究所 Multiple access method based on Load-aware in a kind of wireless self-networking
CN113839720A (en) * 2021-09-06 2021-12-24 中山大学 Multiple access method of directional underwater acoustic network

Also Published As

Publication number Publication date
WO2014123815A1 (en) 2014-08-14
US9288709B2 (en) 2016-03-15

Similar Documents

Publication Publication Date Title
US9288709B2 (en) Adjustable carrier sense threshold for wireless broadcast
US9565622B2 (en) Detecting services provided by a wireless node before device discovery and connection establishment
JP6798049B2 (en) Channel-aware resource allocation
JP6219505B2 (en) Method and apparatus for clear channel assessment
JP5436580B2 (en) Transmission with collision detection and mitigation for wireless communication
EP2932768B1 (en) System and method for improved communication on a wireless network
US9814085B2 (en) Systems and methods for fast initial network link setup
WO2016002263A1 (en) Wireless communications device, wireless communications method, and program
JP6166797B2 (en) Predicting the quality of service of a possible future connection of a device to a wireless network
US20170367129A1 (en) System and Method for Changing an Identifier of a Basic Service Set
US9271317B2 (en) Systems and methods for fast initial network link setup
US9998945B2 (en) Methods and apparatus to change peer discovery transmission frequency based on congestion in peer-to-peer networks
JP2016506215A (en) Wireless network size monitoring
US9191977B2 (en) Systems and methods for fast initial network link setup
JP2012516124A (en) Automatic gain control in wireless communication networks
KR101728290B1 (en) On-demand, request-response based discovery in peer-to-peer networks
US9763228B2 (en) Methods and apparatus for independent basic service set based data paths for neighbor aware networks
JP2016518072A (en) System and method for channel-dependent CCA thresholds for balancing different use cases in a wireless network
US10462814B2 (en) Methods and apparatus for signaling enhanced distributed channel access parameters for subsets of wireless devices
US10122438B2 (en) Systems, methods and devices for modifying relay operation of a wireless device
WO2022117087A1 (en) Method and device for positioning on sidelink (sl), and terminal
US9084141B2 (en) Systems and methods for grouping nodes to reduce collisions
KR20170132455A (en) Bluetooth beacon signal transmission and reception apparauts and system

Legal Events

Date Code Title Description
AS Assignment

Owner name: QUALCOMM INCORPORATED, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DING, GANG;CHIKKAPPA, KIRAN S.;LUNDQVIST, PATRIK N.;AND OTHERS;SIGNING DATES FROM 20130226 TO 20130304;REEL/FRAME:029921/0131

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200315